Analysis
-
max time kernel
66s -
max time network
126s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-05-2021 17:48
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210410
General
-
Target
sample.exe
-
Size
1.3MB
-
MD5
0e64acab6fb3d50aaebc17e6dfb2d289
-
SHA1
c5c672a4a8ebae04cf7471c56136dce58ccd88f0
-
SHA256
cd19340138f9eab48d20b3bf0a9dc6b4a6908d14cd48511ccefd6dba9e84705f
-
SHA512
e797d31d7355d1f222a444fa934599582ffd9593185668382b9ad05ade1086d152f342305fb1b734a4cc0f691b2b4ba70fd8f183f77aa3f6f775a470fb4e7013
Malware Config
Extracted
C:\Users\Admin\Desktop\Decrypt-me.txt
Email:poker021@mailfence.com
Answer:poker021@tutanota.com
Signatures
-
Drops file in Drivers directory 9 IoCs
Processes:
sample.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\gmreadme.txt sample.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\bfe.dll.mui sample.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\ndiscap.sys.mui sample.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\pacer.sys.mui sample.exe File opened for modification C:\Windows\SysWOW64\drivers\gm.dls sample.exe File opened for modification C:\Windows\SysWOW64\drivers\wimmount.sys sample.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\qwavedrv.sys.mui sample.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\scfilter.sys.mui sample.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\tcpip.sys.mui sample.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
Processes:
sample.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
sample.exedescription ioc process File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini sample.exe File opened for modification C:\Windows\Fonts\desktop.ini sample.exe File opened for modification C:\Windows\Media\Quirky\Desktop.ini sample.exe File opened for modification C:\Windows\Media\Sonata\Desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini sample.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini sample.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini sample.exe File opened for modification C:\Users\Public\Desktop\desktop.ini sample.exe File opened for modification C:\Windows\Globalization\MCT\MCT-GB\Wallpaper\desktop.ini sample.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini sample.exe File opened for modification C:\Users\Public\Pictures\desktop.ini sample.exe File opened for modification C:\Users\Public\Documents\desktop.ini sample.exe File opened for modification C:\Windows\Media\Savanna\Desktop.ini sample.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini sample.exe File opened for modification C:\Program Files\desktop.ini sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini sample.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini sample.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini sample.exe File opened for modification C:\Users\Admin\Videos\desktop.ini sample.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini sample.exe File opened for modification C:\Windows\Media\Cityscape\Desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini sample.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\MLS6OOW4\desktop.ini sample.exe File opened for modification C:\Windows\Media\Raga\Desktop.ini sample.exe File created C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini sample.exe File opened for modification C:\Windows\Downloaded Program Files\desktop.ini sample.exe File opened for modification C:\Windows\Media\Garden\Desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini sample.exe File opened for modification C:\Windows\Media\Heritage\Desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini sample.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini sample.exe File opened for modification C:\Windows\Globalization\MCT\MCT-US\Link\desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini sample.exe File opened for modification C:\Users\Admin\Cookies\desktop.ini sample.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini sample.exe File created C:\Program Files\desktop.ini sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini sample.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini sample.exe File opened for modification C:\Windows\Media\Landscape\Desktop.ini sample.exe File opened for modification C:\Users\Public\Music\desktop.ini sample.exe File opened for modification C:\Windows\Globalization\MCT\MCT-AU\Wallpaper\desktop.ini sample.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini sample.exe File opened for modification C:\Program Files (x86)\desktop.ini sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini sample.exe File opened for modification C:\Windows\Web\Wallpaper\Nature\Desktop.ini sample.exe File opened for modification C:\Windows\Web\Wallpaper\Scenes\Desktop.ini sample.exe File created C:\Program Files (x86)\desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\93PHUZFG\desktop.ini sample.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini sample.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini sample.exe -
Drops file in System32 directory 64 IoCs
Processes:
sample.exedescription ioc process File opened for modification C:\Windows\SysWOW64\KBDUKX.DLL sample.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package-MiniLP~31bf3856ad364e35~amd64~pt-BR~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnca00e.inf_amd64_neutral_651eeed98428be5e\Amd64\CNB_0295.GPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnep00l.inf_amd64_neutral_f1fa021d2221e2c7\Amd64\EP0LVPZ1.INI sample.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Schemas\PSMaml\task.xsd sample.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package-MiniLP~31bf3856ad364e35~amd64~he-IL~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnbr003.inf_amd64_neutral_dff45d1d0df04caf\Amd64\BRQL57.GPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prngt002.inf_amd64_neutral_df2060d80de9ff13\Amd64\GS3350B.GPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnnr002.inf_amd64_neutral_37896c5e81c8d488\Amd64\NRC6000.GPD sample.exe File opened for modification C:\Windows\SysWOW64\hr-HR\comctl32.dll.mui sample.exe File opened for modification C:\Windows\SysWOW64\spp\tokens\channels\OCUR\Security-SPP-Component-SKU-OCUR-RETAIL1-pl.xrm-ms sample.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-UIAnimation-WinIP-Package~31bf3856ad364e35~amd64~ar-SA~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\System32\DriverStore\en-US\brmfcmdm.inf_loc sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnep00g.inf_amd64_neutral_2926840e245f88f6\Amd64\EP0NGL8R.GPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnin004.inf_amd64_neutral_c8902ae660ab1360\Amd64\IF1371E3.PPD sample.exe File opened for modification C:\Windows\SysWOW64\devrtl.dll sample.exe File opened for modification C:\Windows\SysWOW64\hdwwiz.exe sample.exe File opened for modification C:\Windows\SysWOW64\WMVCORE.DLL sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnep004.inf_amd64_neutral_63b22bfb6b93eaba\Amd64\EP7MDL15.GPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnkm002.inf_amd64_neutral_7c42808e24ebff99\Amd64\KOC20PPU.PPD sample.exe File opened for modification C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-IIS-HttpRedirect-Deployment-DL.man sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnca00c.inf_amd64_neutral_510c36849918ce92\Amd64\CNB_0317.DLL sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prngt004.inf_amd64_neutral_f5bf8a7ba9dfff55\Amd64\GS1433E3.PPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wceisvista.inf_amd64_neutral_3500779911f7f3ca\wceisvista.PNF sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wiaca00b.inf_amd64_neutral_1aaa057d3d52ea43\CNHI08A.DLL sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wiasa002.inf_amd64_neutral_6429a42f1243419a\SA4500.icc sample.exe File opened for modification C:\Windows\SysWOW64\NOISE.CHT sample.exe File opened for modification C:\Windows\SysWOW64\powercpl.dll sample.exe File opened for modification C:\Windows\SysWOW64\en-US\wevtutil.exe.mui sample.exe File opened for modification C:\Windows\SysWOW64\MRINFO.EXE sample.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PowerShell-Client-WTR-Package~31bf3856ad364e35~amd64~~7.2.7601.16406.cat sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mdmmoto1.inf_amd64_neutral_bf4b404852955eb4\mdmmoto1.PNF sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnca00h.inf_amd64_neutral_96a8e38189e54d71\Amd64\CNB_0301.GPD sample.exe File opened for modification C:\Windows\SysWOW64\en-US\chkdsk.exe.mui sample.exe File opened for modification C:\Windows\SysWOW64\en-US\vaultsvc.dll.mui sample.exe File opened for modification C:\Windows\SysWOW64\migration\en-US\SxsMigPlugin.dll.mui sample.exe File opened for modification C:\Windows\SysWOW64\ir41_32.ax sample.exe File opened for modification C:\Windows\SysWOW64\usbui.dll sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\igdlh.inf_amd64_neutral_54a12b57f547d08e\igdumd64.dll sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnep00l.inf_amd64_neutral_f1fa021d2221e2c7\Amd64\EP0LVR10.DLL sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnhp004.inf_amd64_neutral_53f688945cfc24cc\Amd64\hpc5300t.vdf sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnhp004.inf_amd64_neutral_53f688945cfc24cc\Amd64\hpD5400t.vdf sample.exe File opened for modification C:\Windows\SysWOW64\XpsRasterService.dll sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnhp002.inf_amd64_neutral_04d05d1f6a90ea24\Amd64\HPZ6CWN7.INI sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnhp003.inf_amd64_neutral_4480210763997eb4\Amd64\hpj6400t.xml sample.exe File opened for modification C:\Windows\SysWOW64\en-US\cmcfg32.dll.mui sample.exe File opened for modification C:\Windows\SysWOW64\wbem\wbemprox.dll sample.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\HelpV3.format.ps1xml sample.exe File opened for modification C:\Windows\SysWOW64\prvdmofcomp.dll sample.exe File opened for modification C:\Windows\SysWOW64\en-US\rpcrt4.dll.mui sample.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Win8IP-Microsoft-Windows-Graphics-Package~31bf3856ad364e35~amd64~he-IL~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mdmar1.inf_amd64_neutral_b8ebf59556c3dbf0\mdmar1.inf sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\net1qx64.inf_amd64_neutral_85d10fa4c777b7be\net1qx64.PNF sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnlx00b.inf_amd64_neutral_89b555703683b583\Amd64\LXT650.GPD sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnsa002.inf_amd64_neutral_d9df1d04d8cbe336\Amd64\smpicfg3.ini sample.exe File opened for modification C:\Windows\SysWOW64\en-US\polstore.dll.mui sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnca00e.inf_amd64_neutral_651eeed98428be5e\Amd64\CNBP_297.DLL sample.exe File opened for modification C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-NetworkBridge-DL.man sample.exe File opened for modification C:\Windows\System32\DriverStore\en-US\lsi_scsi.inf_loc sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnca00g.inf_amd64_neutral_6f76b14b2912fa55\Amd64\CNB_0281.DLL sample.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnsa002.inf_amd64_neutral_d9df1d04d8cbe336\Amd64\smc770u.xml sample.exe File opened for modification C:\Windows\SysWOW64\migwiz\dlmanifests\MediaServer-Multicast-Migration-DL.man sample.exe File opened for modification C:\Windows\SysWOW64\wbem\portabledeviceapi.mof sample.exe File opened for modification C:\Windows\SysWOW64\wbem\WsmAgent.mof sample.exe -
Drops file in Program Files directory 64 IoCs
Processes:
sample.exedescription ioc process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.ja_5.5.0.165303.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099196.GIF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01179J.JPG.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_zh_4.4.0.v20140623020002.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\vlc.mo sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.LEX sample.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14514_.GIF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\j2pcsc.dll sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.c.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.zh_CN_5.5.0.165303.jar sample.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Faroe sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libcaf_plugin.dll sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313965.JPG sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PSSKETLG.WMF sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PEOPLEDATAHANDLER.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp sample.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0102984.WMF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105266.WMF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02077_.GIF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets.nl_ja_4.4.0.v20140623020002.jar sample.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach_5.5.0.165303.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_floating.png sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_up_BIDI.png sample.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif sample.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kamchatka.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV.HXS.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsid_plugin.dll sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_ja.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Contacts.accdt sample.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\dnsns.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02120_.WMF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2ssv.dll.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRdIF.dll.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLMIME.DLL sample.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\grayStateIcon.png sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css sample.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe sample.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\PREVIEW.GIF sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DELIMDOS.FAE sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN092.XML sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01236_.WMF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox.nl_ja_4.4.0.v20140623020002.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application.xml.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\26.png sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\MSVCR71.DLL.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01180_.WMF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jce.jar.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-core.xml sample.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\42.png sample.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14996_.GIF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\MANIFEST.MF sample.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Brunei sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_rest.png sample.exe File created C:\Program Files\Mozilla Firefox\xul.dll.sig.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03224I.JPG sample.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_rgb_plugin.dll.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\BUTTON.GIF sample.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216612.WMF.[poker021@mailfence.com][MJ-UG7304985126].poker sample.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui sample.exe -
Drops file in Windows directory 64 IoCs
Processes:
sample.exedescription ioc process File opened for modification C:\Windows\servicing\Packages\Package_1_for_KB4019990~31bf3856ad364e35~amd64~~6.1.1.2.mum sample.exe File opened for modification C:\Windows\servicing\Packages\Package_310_for_KB3109118~31bf3856ad364e35~amd64~~6.1.4.0.mum sample.exe File opened for modification C:\Windows\servicing\Editions\HomePremiumEdition.xml sample.exe File opened for modification C:\Windows\inf\prnkm002.inf sample.exe File opened for modification C:\Windows\inf\wiaca00b.inf sample.exe File opened for modification C:\Windows\inf\.NET Memory Cache 4.0\0009\netmemorycache.ini sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1036\SetupResources.dll sample.exe File opened for modification C:\Windows\Globalization\MCT\MCT-AU\Wallpaper\AU-wp6.jpg sample.exe File opened for modification C:\Windows\Media\Festival\Windows Error.wav sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\normnfc.nlp sample.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-RDC-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514.cat sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\adonetdiag.mof sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardCreateRoles.ascx.resx sample.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-Windows-WinIP-Package~31bf3856ad364e35~amd64~da-DK~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Linq.Queryable\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Linq.Queryable.dll sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\System.EnterpriseServices.Wrapper.dll sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\image2.gif sample.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package-MiniLP~31bf3856ad364e35~amd64~th-TH~7.1.7601.16492.mum sample.exe File opened for modification C:\Windows\servicing\Packages\Package_419_for_KB3109118~31bf3856ad364e35~amd64~~6.1.4.0.cat sample.exe File opened for modification C:\Windows\servicing\Packages\Package_for_KB3109118_SP1_GM~31bf3856ad364e35~amd64~~6.1.4.0.mum sample.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\System.IdentityModel\9b1d7533105a793af14b7b51cd5443af\System.IdentityModel.ni.dll sample.exe File opened for modification C:\Windows\inf\ts_wpdmtp.inf sample.exe File opened for modification C:\Windows\Installer\fb5e.msi sample.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Win32.Primitives\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Win32.Primitives.dll sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\clrcompression.dll sample.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-Windows-WinIP-Package~31bf3856ad364e35~amd64~hu-HU~7.1.7601.16492.mum sample.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Web.4961ff77#\28b0b7573c3bdbc27187e3dbc4f1f1ff\System.Web.Entity.Design.ni.dll sample.exe File opened for modification C:\Windows\inf\bthprint.inf sample.exe File opened for modification C:\Windows\inf\prnrc005.PNF sample.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-InternetExplorer-Package~31bf3856ad364e35~amd64~en-US~11.2.9600.16428.mum sample.exe File opened for modification C:\Windows\AppPatch\AppPatch64\sysmain.sdb sample.exe File opened for modification C:\Windows\Media\Garden\Windows Hardware Insert.wav sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationHostDLL.dll sample.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package-MiniLP~31bf3856ad364e35~amd64~fi-FI~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package~31bf3856ad364e35~amd64~fi-FI~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-Multimedia-Package~31bf3856ad364e35~amd64~es-ES~7.1.7601.16492.mum sample.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Draw0a54d252#\ef31f92d5ee5c2a437add4506830d025\System.Drawing.Design.ni.dll.aux sample.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml.Linq\f68563fb25af65c25de37130ebcd576c\System.Xml.Linq.ni.dll.aux sample.exe File opened for modification C:\Windows\Media\Calligraphy\Windows Print complete.wav sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\web_lowtrust.config sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsn.dll sample.exe File opened for modification C:\Windows\SoftwareDistribution\PostRebootEventCache\{CD35D76E-B003-4461-B93C-D47630C7AF32}.bin sample.exe File opened for modification C:\Windows\assembly\pubpol42.dat sample.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\5910828a337dbe848dc90c7ae0a7dee2\System.Drawing.ni.dll sample.exe File opened for modification C:\Windows\Fonts\BELLI.TTF sample.exe File opened for modification C:\Windows\inf\ramdisk.PNF sample.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\web_minimaltrust.config.default sample.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-Shell-WinIP-Package~31bf3856ad364e35~amd64~hu-HU~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.11.0.office\14.0.0.0__71e9bce111e9429c\Policy.11.0.office.config sample.exe File opened for modification C:\Windows\Fonts\ega40737.fon sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Users\App_LocalResources\findUsers.aspx.resx sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\System.EnterpriseServices.tlb sample.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-Printer-Drivers-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514.cat sample.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-Com-WinIP-Package~31bf3856ad364e35~amd64~ja-JP~7.1.7601.16492.cat sample.exe File opened for modification C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35\ehexthost32.exe sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Drawing.tlb sample.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENTRAL_mfc100kor_x64 sample.exe File opened for modification C:\Windows\ehome\CreateDisc\Filters\AudioDepthConverter.ax sample.exe File opened for modification C:\Windows\Help\Windows\en-US\library.H1S sample.exe File opened for modification C:\Windows\Media\Heritage\Windows Logoff Sound.wav sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\image1.gif sample.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MUI\0409\mscorsecr.dll sample.exe -
NTFS ADS 3 IoCs
Processes:
sample.exedescription ioc process File opened for modification C:\Users\Admin\Documents\My Music\ꡀ眡ʺÿC:\Users\Admin\Documents\WaitLock.txt sample.exe File opened for modification C:\Users\Admin\Documents\My Pictures\ꡀ眡ʺÿC:\Users\Admin\Documents\WaitLock.txt sample.exe File opened for modification C:\Users\Admin\Documents\My Videos\ꡀ眡ʺÿC:\Users\Admin\Documents\WaitLock.txt sample.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
sample.exepid process 1640 sample.exe 1640 sample.exe 1640 sample.exe 1640 sample.exe 1640 sample.exe 1640 sample.exe 1640 sample.exe 1640 sample.exe 1640 sample.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
sample.execmd.exenet.execmd.exenet.execmd.exenet.execmd.exenet.exedescription pid process target process PID 1640 wrote to memory of 1208 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1208 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1208 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1208 1640 sample.exe cmd.exe PID 1208 wrote to memory of 1280 1208 cmd.exe net.exe PID 1208 wrote to memory of 1280 1208 cmd.exe net.exe PID 1208 wrote to memory of 1280 1208 cmd.exe net.exe PID 1208 wrote to memory of 1280 1208 cmd.exe net.exe PID 1280 wrote to memory of 1236 1280 net.exe net1.exe PID 1280 wrote to memory of 1236 1280 net.exe net1.exe PID 1280 wrote to memory of 1236 1280 net.exe net1.exe PID 1280 wrote to memory of 1236 1280 net.exe net1.exe PID 1640 wrote to memory of 1972 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1972 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1972 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1972 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1952 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1952 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1952 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1952 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1728 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1728 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1728 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1728 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1768 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1768 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1768 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1768 1640 sample.exe cmd.exe PID 1768 wrote to memory of 1700 1768 cmd.exe net.exe PID 1768 wrote to memory of 1700 1768 cmd.exe net.exe PID 1768 wrote to memory of 1700 1768 cmd.exe net.exe PID 1768 wrote to memory of 1700 1768 cmd.exe net.exe PID 1700 wrote to memory of 1628 1700 net.exe net1.exe PID 1700 wrote to memory of 1628 1700 net.exe net1.exe PID 1700 wrote to memory of 1628 1700 net.exe net1.exe PID 1700 wrote to memory of 1628 1700 net.exe net1.exe PID 1640 wrote to memory of 1464 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1464 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1464 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1464 1640 sample.exe cmd.exe PID 1464 wrote to memory of 1484 1464 cmd.exe net.exe PID 1464 wrote to memory of 1484 1464 cmd.exe net.exe PID 1464 wrote to memory of 1484 1464 cmd.exe net.exe PID 1464 wrote to memory of 1484 1464 cmd.exe net.exe PID 1484 wrote to memory of 1716 1484 net.exe net1.exe PID 1484 wrote to memory of 1716 1484 net.exe net1.exe PID 1484 wrote to memory of 1716 1484 net.exe net1.exe PID 1484 wrote to memory of 1716 1484 net.exe net1.exe PID 1640 wrote to memory of 1588 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1588 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1588 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1588 1640 sample.exe cmd.exe PID 1588 wrote to memory of 1660 1588 cmd.exe net.exe PID 1588 wrote to memory of 1660 1588 cmd.exe net.exe PID 1588 wrote to memory of 1660 1588 cmd.exe net.exe PID 1588 wrote to memory of 1660 1588 cmd.exe net.exe PID 1660 wrote to memory of 328 1660 net.exe net1.exe PID 1660 wrote to memory of 328 1660 net.exe net1.exe PID 1660 wrote to memory of 328 1660 net.exe net1.exe PID 1660 wrote to memory of 328 1660 net.exe net1.exe PID 1640 wrote to memory of 1812 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1812 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1812 1640 sample.exe cmd.exe PID 1640 wrote to memory of 1812 1640 sample.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Drops file in Drivers directory
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSDTC2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop MSDTC3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSDTC4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop vds2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop vds3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vds4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off2⤵
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable2⤵
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLWriter2⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLBrowser2⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO12⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$CONTOSO13⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$CONTOSO14⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Decrypt-me.txt1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\Decrypt-me.txtMD5
7fc41c92d20d4659f22ee252a93af9ed
SHA119b26f6043de9fbf1717eb93f4fd2a55a395eb57
SHA2561b148dcb657c925a5360fa3e20d8ed0d80fe0b2cc67cb69255aa82d017f2daee
SHA512a33be73cc3ffc7807a7ddde098c4879f97d669f2396a77f7954d2418c9c13547a1f5bdd1d2a3682c8e3c44dac67dadce552a1e8d9f0b3ecbcf7e4e813b8edf65
-
memory/328-73-0x0000000000000000-mapping.dmp
-
memory/520-81-0x0000000000000000-mapping.dmp
-
memory/616-80-0x0000000000000000-mapping.dmp
-
memory/844-77-0x0000000000000000-mapping.dmp
-
memory/968-78-0x0000000000000000-mapping.dmp
-
memory/1108-83-0x0000000000000000-mapping.dmp
-
memory/1208-92-0x000007FEFB881000-0x000007FEFB883000-memory.dmpFilesize
8KB
-
memory/1208-59-0x0000000000000000-mapping.dmp
-
memory/1236-86-0x0000000000000000-mapping.dmp
-
memory/1236-61-0x0000000000000000-mapping.dmp
-
memory/1280-60-0x0000000000000000-mapping.dmp
-
memory/1372-82-0x0000000000000000-mapping.dmp
-
memory/1456-88-0x0000000000000000-mapping.dmp
-
memory/1464-68-0x0000000000000000-mapping.dmp
-
memory/1484-69-0x0000000000000000-mapping.dmp
-
memory/1588-71-0x0000000000000000-mapping.dmp
-
memory/1628-91-0x0000000000000000-mapping.dmp
-
memory/1628-67-0x0000000000000000-mapping.dmp
-
memory/1660-72-0x0000000000000000-mapping.dmp
-
memory/1696-90-0x0000000000000000-mapping.dmp
-
memory/1700-66-0x0000000000000000-mapping.dmp
-
memory/1716-70-0x0000000000000000-mapping.dmp
-
memory/1728-64-0x0000000000000000-mapping.dmp
-
memory/1740-85-0x0000000000000000-mapping.dmp
-
memory/1768-65-0x0000000000000000-mapping.dmp
-
memory/1796-75-0x0000000000000000-mapping.dmp
-
memory/1796-76-0x0000000075631000-0x0000000075633000-memory.dmpFilesize
8KB
-
memory/1800-84-0x0000000000000000-mapping.dmp
-
memory/1812-74-0x0000000000000000-mapping.dmp
-
memory/1952-89-0x0000000000000000-mapping.dmp
-
memory/1952-63-0x0000000000000000-mapping.dmp
-
memory/1956-87-0x0000000000000000-mapping.dmp
-
memory/1972-62-0x0000000000000000-mapping.dmp